The world has become a global village after rapid developments and advancements in information and communication technology, media resources, transportation and networking. The interaction and coordination among people has improved tremendously in last 3 decades after the advent…
The use of intranet, extranets, internet and information systems across organisations have contributed significantly in growth and prosperity because it facilitates timely communication with business parties. However, the emergence of hackers and criminals that develop viruses and malwares have jeopardised the security of public and private business information and records in an organisation. The author, therefore, has decided to conduct extensive research over growing menace of cyber crimes and cyber warfare because the present 21st century is known as ‘information era’. Nonetheless, the organisations now consider greater focus on information and knowledge, which is viewed as most precious asset in today’s business environment.
Cyber crimes refer to online frauds and internet-based crimes such as hacking email address, user accounts, stealing personal information (credit, visa and debit card pins, bio data, etc) from information systems of firms and from computers of end users, attacking computers through viruses in spam emails etc.
Cyber Warfare is different from cyber crimes in a way it refers to online information war between two rival countries. Indeed, the hackers from Country A may attack government websites, information databases and networks of Country B through use of hacking tools in order to obtain clandestine information regarding foreign policy and agenda, military spending and power, diplomatic relationships and back channel diplomacy etc, economic and trade agreements etc. For instance, the main aim is to access implicit information and to destroy existing data warehouses and governmental networks to bring economic, technical and social losses to rival nation.
Although systems and software developing IT organisations (such as Microsoft, Apple, IBM) have been striving to deal with the rising menace of cyber crime, ...
Cite this document
(“Cyber-warfare: The next threat for 21st century Research Proposal”, n.d.)
Retrieved from https://studentshare.net/miscellaneous/410188-cyber-warfare-the-next-threat-for-21st-century
(Cyber-Warfare: The Next Threat for 21st Century Research Proposal)
“Cyber-Warfare: The Next Threat for 21st Century Research Proposal”, n.d. https://studentshare.net/miscellaneous/410188-cyber-warfare-the-next-threat-for-21st-century.
This will be a research work that will set out to among other things achieve a number of purposes. The researcher shall examine the relationship between cyber bullying and change in age. In addition, the researcher shall investigate how bullying or victimization affects the child’s heath system. The research shall have a purpose of identifying different cyber bullying coping mechanisms that can be put in place to help fight cyber bullying and its effects among males in both primary and secondary school, educators.
The increase in the prevalence of Internet usage in the recent decade led to a rise in the number of studies on cyber bullying. In spite of the alarming increase of cyber bullying cases, there remains an inadequacy of research concerning the motivations for cyber bullying.
While the danger that cyber-terrorism poses to the Internet is frequently debated, surprisingly little is known about the threat posed by terrorists' use of the Internet. The Internet has become a forum for terrorist groups and individual terrorists, both to spread their messages of hate and violence and to communicate with one another.
One specific question that arises is whether or not it is feasible to consider an increase in public health care for all. Also, in the healthcare business, there is a need to address staff shortages, not so much because of salary but because of stress due to unrealistic demands.
The specific topic is related to two key disciplines. Primarily, reference should be made to the relationship between the topic and Information Technology. The topic can be also related to the Criminal Justice in the following way: the violation of Cyber Security has a series of legal consequences for the violator.
lved so quickly that the way and manner in which it was used a decade back has changed significantly today (Zhang, Johansson, Lygeros & Sastry, 2001). For example as platform that was largely used on computers for worldwide web connectivity, the internet is today used to support
20 Pages(5000 words)Research Proposal
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Research Proposal on topic Cyber-warfare: The next threat for 21st century for FREE!